Lucene search

K
cvelistJFROGCVELIST:CVE-2024-5565
HistoryMay 31, 2024 - 2:24 p.m.

CVE-2024-5565 Prompt Injection in "ask" API with visualization leads to RCE

2024-05-3114:24:21
JFROG
www.cve.org
1
cve-2024-5565
prompt injection
ask api
visualization
rce
vanna library
python code

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

9.1%

The Vanna library uses a prompt function to present the user with visualized results, it is possible to alter the prompt using prompt injection and run arbitrary Python code instead of the intended visualization code. Specifically - allowing external input to the library’s β€œask” method with β€œvisualize” set to True (default behavior) leads to remote code execution.

CNA Affected

[
  {
    "collectionURL": "https://pypi.org/project/pip",
    "defaultStatus": "affected",
    "packageName": "vanna",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "python"
      }
    ]
  }
]

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

9.1%

Related for CVELIST:CVE-2024-5565